咨询与建议

限定检索结果

文献类型

  • 462 篇 期刊文献
  • 318 篇 会议

馆藏范围

  • 780 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 494 篇 工学
    • 363 篇 计算机科学与技术...
    • 307 篇 软件工程
    • 98 篇 生物工程
    • 77 篇 信息与通信工程
    • 69 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 50 篇 电气工程
    • 47 篇 控制科学与工程
    • 35 篇 电子科学与技术(可...
    • 24 篇 化学工程与技术
    • 18 篇 机械工程
    • 16 篇 仪器科学与技术
    • 16 篇 安全科学与工程
    • 14 篇 土木工程
    • 14 篇 网络空间安全
    • 13 篇 建筑学
  • 304 篇 理学
    • 121 篇 生物学
    • 117 篇 数学
    • 92 篇 物理学
    • 42 篇 统计学(可授理学、...
    • 29 篇 化学
    • 19 篇 系统科学
    • 18 篇 地球物理学
  • 115 篇 管理学
    • 61 篇 图书情报与档案管...
    • 59 篇 管理科学与工程(可...
    • 20 篇 工商管理
  • 62 篇 医学
    • 54 篇 临床医学
    • 53 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
    • 18 篇 公共卫生与预防医...
  • 15 篇 法学
  • 11 篇 农学
  • 9 篇 经济学
  • 8 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 26 篇 deep neural netw...
  • 26 篇 machine learning
  • 23 篇 semantics
  • 21 篇 deep learning
  • 17 篇 training
  • 16 篇 computational mo...
  • 12 篇 memory managemen...
  • 11 篇 task analysis
  • 11 篇 feature extracti...
  • 10 篇 data models
  • 8 篇 scalability
  • 8 篇 generative adver...
  • 8 篇 graph neural net...
  • 8 篇 predictive model...
  • 7 篇 parallel process...
  • 7 篇 magnetic resonan...
  • 7 篇 computer archite...
  • 7 篇 throughput
  • 7 篇 containers
  • 7 篇 efficiency

机构

  • 102 篇 national enginee...
  • 56 篇 school of comput...
  • 51 篇 school of cyber ...
  • 36 篇 national enginee...
  • 31 篇 services computi...
  • 31 篇 hubei engineerin...
  • 28 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 26 篇 huazhong univers...
  • 21 篇 hiroshima astrop...
  • 21 篇 department of ph...
  • 19 篇 school of softwa...
  • 18 篇 university of ch...
  • 17 篇 department of ph...
  • 16 篇 berkeley institu...
  • 16 篇 secure computing...
  • 16 篇 zhejiang lab
  • 15 篇 department of ph...
  • 15 篇 physics division...
  • 15 篇 national energy ...

作者

  • 112 篇 hai jin
  • 109 篇 jin hai
  • 42 篇 xiaofei liao
  • 25 篇 hu shengshan
  • 21 篇 haikun liu
  • 19 篇 long zheng
  • 19 篇 liao xiaofei
  • 18 篇 zou deqing
  • 17 篇 zhang leo yu
  • 17 篇 nachman benjamin
  • 16 篇 wu baoyuan
  • 15 篇 bastieri d.
  • 15 篇 green d.
  • 15 篇 orlando e.
  • 15 篇 lubrano p.
  • 15 篇 gargano f.
  • 15 篇 spinelli p.
  • 15 篇 kuss m.
  • 15 篇 mikuni vinicius
  • 15 篇 yu zhang

语言

  • 705 篇 英文
  • 69 篇 其他
  • 9 篇 中文
检索条件"机构=Cognitive Computing and Data Science Research Lab"
780 条 记 录,以下是121-130 订阅
排序:
Differentially Private Deep Learning with Iterative Gradient Descent Optimization
收藏 引用
ACM/IMS Transactions on data science 2021年 第4期2卷 1–27页
作者: Ding, Xiaofeng Chen, Lin Zhou, Pan Jiang, Wenbin Jin, Hai National Engineering Research Center for Big Data Technology and System Lab Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
Deep learning has achieved great success in various areas and its success is closely linked to the availability of massive data. But in general, a large dataset could include sensitive data and therefore the model sho... 详细信息
来源: 评论
MOLECULE GENERATION FOR TARGET PROTEIN BINDING WITH STRUCTURAL MOTIFS  11
MOLECULE GENERATION FOR TARGET PROTEIN BINDING WITH STRUCTUR...
收藏 引用
11th International Conference on Learning Representations, ICLR 2023
作者: Zhang, Zaixi Min, Yaosen Zheng, Shuxin Liu, Qi Anhui Province Key Lab of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China China State Key Laboratory of Cognitive Intelligence Anhui Hefei China Institute of Interdisciplinary Information Sciences Tsinghua University China Microsoft Research United States
Designing ligand molecules that bind to specific protein binding sites is a fundamental problem in structure-based drug design. Although deep generative models and geometric deep learning have made great progress in d... 详细信息
来源: 评论
RE-Matching: A Fine-Grained Semantic Matching Method for Zero-Shot Relation Extraction
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Jun Zhan, Wenyu Zhao, Xin Zhang, Qi Gui, Tao Wei, Zhongyu Wang, Junzhe Peng, Minlong Sun, Mingming School of Computer Science Fudan University China Institute of Modern Languages and Linguistics Fudan University China School of Data Science Fudan University China Cognitive Computing Lab Baidu Research United States
Semantic matching is a mainstream paradigm of zero-shot relation extraction, which matches a given input with a corresponding label description. The entities in the input should exactly match their hypernyms in the de... 详细信息
来源: 评论
R-divergence for estimating model-oriented distribution discrepancy  23
R-divergence for estimating model-oriented distribution disc...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Zhilin Zhao Longbing Cao Data Science Lab School of Computing & DataX Research Centre Macquarie University Sydney NSW Australia
Real-life data are often non-IID due to complex distributions and interactions, and the sensitivity to the distribution of samples can differ among learning models. Accordingly, a key question for any supervised or un...
来源: 评论
WebCode2M: A Real-World dataset for Code Generation from Webpage Designs  25
WebCode2M: A Real-World Dataset for Code Generation from Web...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Gui, Yi Li, Zhen Wan, Yao Shi, Yemin Zhang, Hongyu Su, Yi Chen, Bohua Chen, Dongping Wu, Siyuan Zhou, Xing Jiang, Wenbin Jin, Hai Zhang, Xiangliang Huazhong University of Science and Technology Wuhan China Peking University Beijing China Chongqing University Chongqing China Hubei University of Automotive Technology Shiyan China Rabbitpre AI Shenzhen China University of Notre Dame Notre Dame United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster Grid Computing Lab School of Computer Science and Technology China
Automatically generating webpage code from webpage designs can significantly reduce the workload of front-end developers, and recent Multimodal Large Language Models (MLLMs) have shown promising potential in this area... 详细信息
来源: 评论
Efficient Hardware Redo Logging for Secure Persistent Memory  23
Efficient Hardware Redo Logging for Secure Persistent Memory
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on data science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Zhan Yue, Jianhui Liao, Xiaofei Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China Michigan Technological University Computer Science Department HoughtonMI United States
Write-ahead log and data encryption technologies are employed to ensure both crash consistency and data security for persistent memory (PM). The encryption/decryption of both data and log requests increase the memory ... 详细信息
来源: 评论
BOAT: Bilateral Local Attention Vision Transformer  33
BOAT: Bilateral Local Attention Vision Transformer
收藏 引用
33rd British Machine Vision Conference Proceedings, BMVC 2022
作者: Yu, Tan Zhao, Gangming Li, Ping Yu, Yizhou Cognitive Computing Lab Baidu Research 10900 NE 8th St. BellevueWA United States Department of Computer Science The University of Hong Kong Hong Kong
Vision Transformers achieved outstanding performance in many computer vision tasks. Early Vision Transformers such as ViT and DeiT adopt global self-attention, which is computationally expensive when the number of pat... 详细信息
来源: 评论
Unlearnable 3D point clouds: class-wise transformation is all you need  24
Unlearnable 3D point clouds: class-wise transformation is al...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Xianlong Wang Minghui Li Wei Liu Hangtao Zhang Shengshan Hu Yechao Zhang Ziqi Zhou Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
An Exploratory Study of Automated Anti-phishing System  9th
An Exploratory Study of Automated Anti-phishing System
收藏 引用
9th International Conference on computing and Informatics, ICOCI 2023
作者: Aziz, Mochamad Azkal Azkiya Riskhan, Basheer Zakaria, Nur Haryani Jambli, Mohamad Nazim Albukhary International University Kedah Alor Setar05200 Malaysia Data Management & Software Solution Research Lab School of Computing Universiti Utara Malaysia Kedah Sintok06010 Malaysia Faculty of Computer Science and Information Technology University Malaysia Sarawak Sarawak Kota Samarahan Malaysia
Phishing attacks have emerged as a major problem in the digital world due to a rising trend in their frequency. While various approaches have been developed to detect and prevent phishing attacks, a definitive solutio... 详细信息
来源: 评论
HYPERBOLIC HYPERGRAPH NEURAL NETWORKS FOR MULTI-RELATIONAL KNOWLEDGE HYPERGRAPH REPRESENTATION
arXiv
收藏 引用
arXiv 2024年
作者: Li, Mengfan Shi, Xuanhua Qiao, Chenqi Zhang, Teng Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Knowledge hypergraphs generalize knowledge graphs using hyperedges to connect multiple entities and depict complicated relations. Existing methods either transform hyperedges into an easier-to-handle set of binary rel... 详细信息
来源: 评论